Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 5 |
Descriptor
| Coding | 7 |
| Computer Security | 7 |
| Internet | 7 |
| Technology | 4 |
| Networks | 3 |
| Computer Science | 2 |
| Mathematics | 2 |
| Privacy | 2 |
| Safety | 2 |
| Web Sites | 2 |
| Addictive Behavior | 1 |
| More ▼ | |
Source
| E-Learning and Digital Media | 1 |
| Electronic Library | 1 |
| International Journal of… | 1 |
| Mathematics Teacher | 1 |
| Online Submission | 1 |
| ProQuest LLC | 1 |
| Science Teacher | 1 |
Author
| Bachman, Dale J. | 1 |
| Bar-Ilan, Judit | 1 |
| Brown, Ezra A. | 1 |
| Buchanan, Rachel | 1 |
| Dixit, R. K. | 1 |
| Kang, Hun Jeong | 1 |
| Kervin, Melissa | 1 |
| McMullan, John L. | 1 |
| Murray, Tiana | 1 |
| Noble, Brittany | 1 |
| Norton, Anderson H. | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 5 |
| Reports - Descriptive | 2 |
| Reports - Research | 2 |
| Collected Works - Serial | 1 |
| Dissertations/Theses -… | 1 |
| Opinion Papers | 1 |
Education Level
| Elementary Education | 1 |
Audience
Location
| Australia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Buchanan, Rachel; Southgate, Erica; Smith, Shamus P.; Murray, Tiana; Noble, Brittany – E-Learning and Digital Media, 2017
Given that today's children are prolific users of the internet, concern has been raised about the future impact of the digital footprints they are currently generating. Here, we report on the "Best Footprint Forward" project which utilised focus groups to investigate the digital footprint awareness of 33 children (ranging in age from 10…
Descriptors: Internet, Preadolescents, Elementary School Students, Computer Use
McMullan, John L.; Kervin, Melissa – International Journal of Mental Health and Addiction, 2012
This study examines the web design and engineering, advertising and marketing, and pedagogical features present at a random sample of 71 international poker sites obtained from the Casino City directory in the summer of 2009. We coded for 22 variables related to access, appeal, player protection, customer services, on-site security, use of images,…
Descriptors: Addictive Behavior, Familiarity, Advertising, Internet
Kang, Hun Jeong – ProQuest LLC, 2010
With the success of applications spurring the tremendous increase in the volume of data transfer, efficient and reliable content distribution has become a key issue. Peer-to-peer (P2P) technology has gained popularity as a promising approach to large-scale content distribution due to its benefits including self-organizing, load-balancing, and…
Descriptors: Efficiency, Internet, Information Services, Technology
Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H. – Mathematics Teacher, 2010
Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…
Descriptors: Intellectual Property, Privacy, Computer Security, Internet
Peer reviewedBar-Ilan, Judit – Electronic Library, 1996
Discusses some basic notions of modern cryptography: public key systems and digital signatures. Describes how theoretical modern cryptography can help solve security problems on the Internet. (Author/JKP)
Descriptors: Coding, Computer Security, Computer System Design, Cryptography
Peer reviewedSullivan, Megan – Science Teacher, 2005
For the general public, the field of cryptography has recently become famous as the method used to uncover secrets in Dan Brown's fictional bestseller, The Da Vinci Code. But the science of cryptography has been popular for centuries--secret hieroglyphics discovered in Egypt suggest that code-making dates back almost 4,000 years. In today's…
Descriptors: Information Skills, Programming, Internet, Computer Security
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software

Direct link
